CVE-2026-7584
Published: 01 May 2026
Summary
CVE-2026-7584 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Zhinst Labone Q. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 12.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring validation of serialized inputs to reject arbitrary class names and constructor arguments during deserialization.
Mandates identification, reporting, and correction of the insecure deserialization flaw to prevent arbitrary code execution.
Verifies integrity of experiment files and software components prior to deserialization, blocking tampered data that exploits the class-loading mechanism.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The insecure deserialization in import_cls allows arbitrary Python class loading and code execution from a crafted serialized file, directly enabling T1204.002 (victim loads malicious file) and T1059.006 (Python interpreter execution).
NVD Description
The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target…
more
class or restriction on which modules could be imported. An attacker can craft a serialized experiment file that causes the deserialization engine to import and instantiate arbitrary Python classes with attacker-controlled constructor arguments, resulting in arbitrary code execution in the context of the user running the Python process. Exploitation requires the victim to load a malicious file using LabOne Q's deserialization functions, for example a compromised experiment file shared for collaboration or support purposes.
Deeper analysisAI
CVE-2026-7584 affects the LabOne Q serialization framework's class-loading mechanism, specifically the import_cls function, which dynamically imports and instantiates Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from serialized data without validation of the target class or restrictions on importable modules, enabling insecure deserialization.
An attacker can exploit this vulnerability by crafting a malicious serialized experiment file. Exploitation requires a victim to load the file using LabOne Q's deserialization functions, such as a compromised experiment file shared for collaboration or support purposes. Successful exploitation leads to arbitrary code execution in the context of the user running the Python process. The CVSS v3.1 base score is 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), with no privileges required but local access and user interaction needed.
The vendor's security advisory provides details on mitigation, available at https://www.zhinst.com/support/security/2026/zi-sa-2026-002/.
Details
- CWE(s)